CacheZoom: How SGX Amplifies the Power of Cache Attacks

Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth

Abstract

In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced. Intel proposed SGX to create a trusted execution environment within the processor. SGX relies on the hardware, and claims runtime protection even if the OS and other software components are malicious. However, SGX disregards side-channel attacks. We introduce a powerful cache side-channel attack that provides system adversaries a high resolution channel. Our attack tool named CacheZoom is able to virtually track all memory accesses of SGX enclaves with high spatial and temporal precision. As proof of concept, we demonstrate AES key recovery attacks on commonly used implementations including those that were believed to be resistant in previous scenarios. Our results show that SGX cannot protect critical data sensitive computations, and efficient AES key recovery is possible in a practical environment. In contrast to previous works which require hundreds of measurements, this is the first cache side-channel attack on a real system that can recover AES keys with a minimal number of measurements. We can successfully recover AES keys from T-Table based implementations with as few as ten measurements.
Original languageEnglish
Title of host publicationCryptographic Hardware and Embedded Systems – CHES 2017
EditorsWieland Fischer, Naofumi Homma
Number of pages22
Volume10529
PublisherSpringer Verlag
Publication date25.08.2017
Pages69-90
ISBN (Print)978-3-319-66786-7
ISBN (Electronic)978-3-319-66787-4
DOIs
Publication statusPublished - 25.08.2017
EventCryptographic Hardware and Embedded Systems – CHES 2017 - Taipei, Taiwan, Province of China
Duration: 25.09.201728.09.2017

Fingerprint

Dive into the research topics of 'CacheZoom: How SGX Amplifies the Power of Cache Attacks'. Together they form a unique fingerprint.

Cite this